Behind the Deal: The Rising Fraud Threat in Mergers and Acquisitions
Global mergers and acquisitions (M&A) activity surged in 2025, with deal values rising to $4.9 trillion, an increase of 40%, which contributed 3.2% - 4.2% to GDP.1 In 2026, growth is expected to continue as 80% of M&A executives anticipate sustained or increased deal activity this year.2
Company acquisitions and mergers are high-profile transactions.
Combining companies often involves significant financial stakes, affects large numbers of employees, customers and shareholders, and can reshape entire industries. These transactions attract widespread attention from the media, regulators, and the public due to their potential impact on market dynamics, company valuations and competitive landscapes.
Technological advances will play a pivotal role in driving U.S. M&A activity. To remain competitive, organizations will target businesses with advanced analytics, artificial intelligence and automation expertise. These technology-driven deals not only enable operational efficiencies but also open new avenues for growth and value creation.
The visibility and complexity of company mergers make them frequent targets for both internal and external fraud threats.
Significant financial investments and technological advances drive innovation and growth in U.S. mergers. However, increased media attention and complex processes increase fraud and cybercrime threats.
Change management is vital during mergers and acquisitions. Disgruntled or dishonest employees or partners, uncertain of the transitional environment, may act to protect their interests or retaliate against perceived injustices. These bad actors may engage in occupational fraud, financial records manipulation, asset misrepresentation, as well as concealing liabilities to influence deal terms or for personal gain.
There’s also increased potential for insider trading, as well as unauthorized employee transfers of intellectual property or customer data when combining two companies. Employees may also engage in shadow IT — using unauthorized applications during transition — which further weakens data monitoring and control. Such internal threats can undermine the integrity of the entire transaction and expose both parties to significant financial and reputational harm.
Cybercriminals see company acquisitions and mergers as ideal times to exploit organizational vulnerabilities. They closely monitor public announcements, regulatory filings and media coverage for signs of impending deals. They then assess the complexity and scale of the M&A process, looking for scenarios where increased IT system changes, employee turnover or rushed due diligence could create exploitable vulnerabilities. These risk factors maximize their chances of success and they often target the smaller, less-secure company to infiltrate the larger parent organization.
These opportunists often focus on transactions involving high-value companies, organizations with weaker cybersecurity postures or those operating in industries known for frequent M&A activity. Their goal is to take advantage of employee and customer confusion and lax transitional procedures to initiate ploys that are likely to go unnoticed.
Cyberattacks during M&As can lead to significant financial losses and long-term reputational damage.
Cybersecurity incidents that take place amid the M&A process can profoundly disrupt the organizations involved, causing far-reaching consequences both immediately and in the future. Breaches discovered during or after a deal may lead to significant drops in acquisition valuations — sometimes by 15-20% — and can result in renegotiated terms or even deal cancellations.3 High-profile cases, such as the Verizon-Yahoo merger, demonstrate how undiscovered (called “cyber grenades”) or undisclosed breaches can reduce deal value by hundreds of millions of dollars – in that case $350 million.
Beyond immediate financial losses, cyberattacks can erode trust among investors, employees and customers, potentially causing long-term reputational harm. Regulatory scrutiny and investor lawsuits may follow, especially if internal control weaknesses are exposed. Such was the recent case with IBM spinoff Kyndryl Holdings, an infrastructure provider that investors sued for faulty financial reporting.
In a global survey of 1,309 IT and data security professionals who experienced cyberattacks, 20% reported their organizations lost competitive advantage and 16% witnessed a drop in company valuation.4 In fact, one year after a major cyberattack, companies on the NASDAQ underperform 8.6% on average.5
As cybercriminals commonly use sophisticated ploys — like AI-enabled fraud and deepfakes — the operational risks and complexities of M&A transactions continue to grow, making comprehensive M&A cybersecurity and due diligence essential to safeguarding value and ensuring deal success.
What types of external fraud occur during company acquisitions and mergers?
Fraudsters use social engineering and phishing, ransomware attacks, third-party vendor schemes, supply chain disruption and exploit pre-existing or undisclosed data breaches and legacy systems to commit fraud during a company merger.
Generative AI is making it easier for criminals to create convincing fake emails, documents and even deepfake audio or video, significantly increasing the scale and sophistication of fraud during company acquisitions and mergers. The technology is becoming so pervasive that 72% of business leaders view AI-enabled fraud and deepfakes as a top operational challenge in 2026.6
In 2026, 72% of business leaders view AI-enabled fraud and deepfakes as a top operational challenge.6
While certain cyberattacks are prevalent across the corporate landscape, threat actors deliberately time them to coincide with critical stages of the M&A process to maximize their impact.
- Business email compromise (BEC)
In BEC schemes, attackers spoof email addresses of company executives or finance personnel to impersonate them. The goals of business email compromise scams are to trick employees into taking urgent actions, such as updating customer payment information or initiating wire transfers to fraudulent accounts, often under the guise of merger-related instructions.
- Account takeover
With AI, fraudsters commonly commit phishing or credentials stuffing to gain unauthorized access to corporate accounts. Once inside, attackers can manipulate sensitive financial information, redirect payments or steal intellectual property, often going undetected amid organizational changes.
- Authorized push payment fraud
Authorized Push Payment (APP) fraud tricks employees and customers into willingly sending payments to accounts controlled by criminals. APP is unlike traditional unauthorized transactions in that the sender initiates the payment themselves, believing the transaction is for a legitimate purpose such as paying a supplier, closing a deal or following instructions that seem to be from a trusted source.
- Invoice fraud
Fraudsters may intercept legitimate communications, impersonate trusted parties or use AI-generated emails to manipulate invoice details and redirect funds to their own accounts during deal closings. Criminals may also send fake notices to customers advising them of changes in their bank accounts or invoices to redirect funds to fraudulent accounts.
- Deepfakes
Gen AI enables criminals to impersonate key executives or stakeholders in video calls or audio messages. These fake communications direct employees to transfer funds, disclose confidential information or authorize changes in business operations. Criminals also use AI deepfakes to create fraudulent documents or presentations that appear legitimate to further deceive investors, partners and employees.
- Ransomware
During M&A activity, attackers are aware that organizations may experience operational disruptions, gaps in IT oversight and inconsistent security practices. The urgency to maintain business continuity and avoid delays in the M&A process may pressure targeted companies to pay the ransom quickly since downtime caused by encrypted systems could jeopardize the success of the deal.
Ransomware attackers may use double extortion tactics, threatening to leak sensitive data if corporations don’t meet their demands. Even when corporations pay the ransom fraudsters may still sell the information on the dark web or use it to commit more fraud.
- Small-cap “pump-and-dump”
This is a type of securities fraud in which criminals artificially inflate (“pump”) a small-cap company stock price using misleading or false information. They usually target companies with low market capitalization and/or small, less liquid stocks because the prices are easy to manipulate during high-profile events like mergers or IPOs. After driving up the price, the perpetrators then sell (“dump”) their own shares at the inflated price via a nominee account, leaving unsuspecting investors holding shares that quickly lose value once the truth emerges and the price collapses.
Uncover hidden threats and prevent costly disruptions early on.
Organizational changes during M&A activity often create gaps in oversight and inconsistencies in security controls. Training employees to identify and avoid phishing, social engineering and deepfake threats, as well as establishing clear responsibilities and communications for verifying payment requests are critical to creating a security-centric culture. Corporations should also establish consistent security protocols before and after M&A activity.
- Conduct comprehensive due diligence.
Rigorously vet all parties involved in the transaction, including a deep dive into financials, key personnel, IT systems and third-party vendors. Engage forensic specialists when necessary to uncover hidden risks or suspicious activities.
- Strengthen cybersecurity protocols.
Implement security measures such as multifactor authentication, regular system audits and network segmentation. Ensure both merging organizations adhere to the same exacting standards M&A to minimize gaps during integration.
- Monitor for shadow IT and unusual behavior.
Identify and control unauthorized applications and devices. Use advanced monitoring data security tools to detect abnormal access patterns, privilege escalations or suspicious data transfers throughout the M&A process.
- Develop an incident response plan.
Create a formalized response strategy to prepare for potential breaches or fraud attempts. This plan should include steps for containment, investigation, communication and remediation, ensuring minimal disruption to the deal.
- Engage external advisors.
Consult with legal, financial and cybersecurity experts who specialize in M&A activity to provide independent oversight and help identify evolving risks unique to the transaction.
- Regularly review and update policies.
Continuously assess and improve fraud prevention and detection protocols to keep pace with new threats, technologies and regulatory requirements.
- Provide ongoing fraud awareness communications and training.
Educate both employees and customers about potential threats and ploys. Those who recognize and avoid scams early on are the strongest line of defense.
Proactively adopting best practices can help corporations significantly reduce the risk of falling victim to M&A-related data security fraud and ensure a smoother, more secure transaction process.
Safeguard your organization against merger-related fraud.
When you understand the unique risks associated with company mergers and acquisitions, your organization can preserve deal integrity and ensure business partnerships that are collaborative, mutually beneficial and built on trust.
Synovus can help. For guidance from our experienced banking and fraud specialists, simply complete a short form and a Synovus Treasury & Payment Solutions Consultant will reach out with more details. You’re also welcome to visit one of our local branches.
Caleb Callahan is Head of Fraud for Synovus’ Financial Crimes Unit, with over 20 years in Payments, Enterprise Risk Management, and Fraud Identification, Analysis and Prevention. Callahan is skilled in designing and implementing comprehensive fraud prevention strategies and leading top-level fraud operations teams.
Fraud and Risk Management
Human Hacking: When Fraud Gets Personal
Fraud and Risk Management
Will Your Organization Make the Fraud 'Naughty or Nice' List?
Fraud and Risk Management
How Quick Service Restaurants Can Prevent Fraud and Protect Profits in 2025
-
Expert Financial Strategies for Public Schools and Colleges Facing Rising Costs and Enrollment Declines
Is your institution facing declining enrollment? These financial strategies for public schools and colleges will help address rising costs and intense competition for students.
-
Interest Rates News: First Quarter 2026
See the most recent FOMC rate developments for Q1 2026, including key forecasts and practical borrowing strategies. Explore how adjustments in interest rates can affect your loans, mortgage options and overall business expansion plans.
Important disclosure information
This content is general in nature and does not constitute legal, tax, accounting, financial or investment advice. You are encouraged to consult with competent legal, tax, accounting, financial or investment professionals based on your specific circumstances. We do not make any warranties as to accuracy or completeness of this information, do not endorse any third-party companies, products, or services described here, and take no liability for your use of this information.
- Bain & Company, “Looking Back at M&A in 2025: Behind the Great Rebound,” January 2026 Back
- Ibid Back
- ShareID, “Why Weak Authentication Costs More,” January 16, 2025 Back
- Infosecurity Magazine, “Lawsuits and Company Devaluations Wait for Breached Firms,” May 1, 2024 Back
- SecureWorld, “The True Cost of a Data Breach: A Quantitative Analysis of Market Cap and Shareholder Value,” October 6, 2025 Back
- Experian, “2025 U.S. Identity and Fraud Report,” July 30, 2025 Back